Conference Programme

11th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2014 )

     
    September 2, 2014
    10:30 - 11:00

    Coffee Break

     
    September 2, 2014
    11:00 - 12:00

    Keynote Talk

    Location : ( Lecture Hall 1)

  • "Sustainable Constraint Writing and a Symbolic Viewpoint of Modeling Languages "

    Dirk Draheim, University of Innsbruck, Austria


  •  
    September 2, 2014
    12:00 - 13:30

    Lunch

     
    September 2, 2014
    13:30 - 15:00

    TrustBus - Session 1 : Trust Management

    Location : 3 ( Lecture Hall 3)

    Session Chair : Günther Pernul

  • Conference Opening
    Claudia Eckert, Sokratis K.Katsikas, Günther Pernul

  • Maintaining Trustworthiness of Socio-Technical Systems at Run-Time
    Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem Nasser, Mike Surridge

  • Trust Relationships in Privacy-ABCs' Ecosystems
    Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg

  •  
    September 2, 2014
    15:00 - 15:30

    Coffee Break

     
    September 2, 2014
    15:30 - 17:30

    TrustBus - Session 2 : Trust Metrics & Evaluation Models

    Location : 3 ( Lecture Hall 3)

    Session Chair : Rolf Schillinger

  • Android Malware Detection based on Software Complexity Metrics
    Mykola Protsenko, Tilo Müller

  • A Decision Support System for IT Security Incident Management
    Gerhard Rauchecker, Emrah Yasasin, Guido Schryen

  • Trust Evaluation of a Sysytem for an Activity with Subjective Logic
    Nagham Alhadad, Yann Busnel, Patricia Serrano-Alvarado, Philippe Lamarre

  • A Hash-based Index Method for Securing Biometric Fuzzy Vaults
    Thi Thuy Linh Vo, Tran Khanh Dang, Josef Kueng

  •  
    September 3, 2014
    09:00 - 10:30

    TrustBus - Session 3 : Privacy and Trust in Cloud Computing

    Location : 3 ( Lecture Hall 3)

    Session Chair : Rolf Schillinger

  • A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain
    Youngbae Song, Hyoungshick Kim, Aziz Mohaisen

  • Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results
    Marc Walterbusch, Frank Teuteberg

  • Privacy-Aware Cloud Deployment Scenario Selection
    Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis

  •  
    September 3, 2014
    10:30 - 11:00

    Coffee Break

     
    September 3, 2014
    11:00 - 12:00

    Keynote Talk

    Location : ( Lecture Hall 1)

    Session Chair : Mukesh Mohania

  • A Secure Data Sharing and Query Processing Framework via Federation of Cloud Computing

    Sanjay Kumar Madria, Missouri University of Science and Technology, Rolla, MO


  •  
    September 3, 2014
    12:00 - 13:30

    Lunch

     
    September 3, 2014
    13:30 - 15:00

    TrustBus - Session 4 : Security Management

    Location : 3 ( Lecture Hall 3)

    Session Chair : Tamas K. Lengyel

  • Closing the gap between the specification and enforcement of security policies
    José Miguel Horcas, Mónica Pinto, Lidia Fuentes

  • Business Process Modeling for Insider Threat Monitoring and Handling
    Vasilis Stavrou, Miltiadis Kandias, George Karoulas, Dimitris Gritzalis

  • A Quantitative Analysis of Common Criteria Certification Practice
    Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier

  •  
    September 3, 2014
    15:00 - 15:30

    Coffee Break

     
    September 3, 2014
    15:30 - 17:30

    TrustBus - Session 5 : Security, Trust and Privacy in Mobile and Pervasive Environments

    Location : 3 ( Lecture Hall 3)

    Session Chair : Günther Pernul

  • A Normal-Distribution Based Reputation Model
    Ahmad Abdel-Hafez, Yue Xu, Audun Josang

  • Security and privacy awareness of Android vs. iOS users
    Lena Reinfelder, Zinaida Benenson, Freya Gassmann

  • User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data
    Alfred Kobsa

  • A protocol for intrusion detection in location privacy-aware wireless sensor networks
    Jiri Kur, Vashek Matyas